Vulnslist

find the latest Cisco vulnerabilities

Cisco FirePOWER Software for ASA FirePOWER Module, Firepower Management Center Software, and NGIPS Software SNMP Default Credential Vulnerability

cisco-sa-fmcsfr-snmp-access-6gqgtJ4S · High · Published · Updated

A vulnerability in the Simple Network Management Protocol (SNMP) access controls for Cisco FirePOWER Software for Adaptive Security Appliance (ASA) FirePOWER module, Cisco Firepower Management Center (FMC) Software, and Cisco Next-Generation Intrusion Prevention System (NGIPS) Software could allow an unauthenticated, remote attacker to perform an SNMP GET request using a default credential. This vulnerability is due to the presence of a default credential for SNMP version 1 (SNMPv1) and SNMP version 2 (SNMPv2). An attacker could exploit this vulnerability by sending an SNMPv1 or SNMPv2 GET request to an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the device using the default credential. This attack will only be successful if SNMP is configured, and the attacker can only perform SNMP GET requests; write access using SNMP is not allowed. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmcsfr-snmp-access-6gqgtJ4S This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication.

Workarounds

A user with Administrator privileges can execute the following commands in expert mode to apply a workaround for this vulnerability:

# expert
# sudo su -
# sed -i 's/^com2sec/#com2sec/' /etc/snmp/snmpd.conf
# pmtool restartbyid snmpd

If SNMP is not needed on the device, the administrator can remove the SNMP configuration so the device will not be affected by this vulnerability. The administrator can also reduce the attack surface by allowing SNMP connections only from trusted SNMP monitoring hosts.

While this workaround and mitigation have been deployed and were proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2022-20918
Cisco Bug IDsCSCwa97541
CVSS ScoreBase 7.5
Base 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco FirePOWER Services Software for ASA, Cisco Firepower Management Center 7.0.0, Cisco Firepower Management Center 7.0.0.1, Cisco Firepower Management Center 7.0.1, Cisco Firepower Management Center 7.0.1.1, Cisco Firepower Management Center 7.0.2, Cisco Firepower Management Center 7.0.2.1, Cisco Firepower Management Center 7.0.3, Cisco Firepower Management Center 7.0.4, Cisco Secure Firewall Management Center (FMC), Cisco Secure Firewall Management Center (FMC) Appliances

Related Products

Product CVE Evidence
Cisco Secure Firewall Management Center (FMC) Appliances CVE-2022-20918 Cisco OpenVuln
Cisco Secure Firewall Management Center (FMC) CVE-2022-20918 Cisco OpenVuln
Cisco Firepower Management Center CVE-2022-20918 Cisco OpenVuln
Cisco FirePOWER Services Software for ASA CVE-2022-20918 Cisco OpenVuln